webPromedium
Lab 59 — NetPulse — RCE via Command Injection in Network Diagnostics
hackadvisor
Task: NetPulse monitoring platform with Network Diagnostics module that passes user-supplied interface name directly to shell command without sanitization. Solution: OS command injection via semicolon in iface parameter of /api/diagnostics/interface endpoint to execute arbitrary commands as root and read /root/flag.txt.
$ ls tags/ techniques/
command_injectiondockerrcenodejsnginxexpressos_command_injectionhoneypot_flagnetwork_diagnosticsshell_metacharacterifconfigroot_containerapi_parameter_injection
api_parameter_tamperinghoneypot_flag_detectionos_command_injection_via_semicolonshell_metacharacter_injectionunsanitized_shell_exec
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 322 — NetPulse — IP Spoofing to RCE via Polling Agent API— hackadvisor
- [web][Pro]Lab 384 — DevPulse — RCE via AI Log Assistant Prompt Injection— hackadvisor
- [web][Pro]Lab 56 — DataPulse — XXE to SSRF via SVG Avatar Upload— hackadvisor
- [web][Pro]Lab 54 — PulseGuard — RCE via node:vm Sandbox Escape— hackadvisor
- [web][Pro]CloudPulse— hackadvisor